default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 288 matches
- 2018
- Guoqiang Bai, Hailiang Fu, Wei Li, Xingjun Wu:
Differential Power Attack on SM4 Block Cipher. TrustCom/BigDataSE 2018: 1494-1497 - Na Huang, Jingsha He, Nafei Zhu:
A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network. TrustCom/BigDataSE 2018: 1702-1705 - Xiang Liu, Jie Huang, Guowen Zong:
Public Auditing for Network Coding Based Secure Cloud Storage. TrustCom/BigDataSE 2018: 713-720 - Peter Aaby, Juanjo Mata De Acuna, Richard Macfarlane, William J. Buchanan:
Privacy Parameter Variation Using RAPPOR on a Malware Dataset. TrustCom/BigDataSE 2018: 938-945 - Andreas Abraham, Kevin Theuermann, Emanuel Kirchengast:
Qualified eID Derivation Into a Distributed Ledger Based IdM System. TrustCom/BigDataSE 2018: 1406-1412 - Stephen C. Adams, Peter A. Beling, Steven Greenspan, Maria C. Velez-Rojas, Serge Mankovski:
Model-Based Trust Assessment for Internet of Things Networks. TrustCom/BigDataSE 2018: 1838-1843 - Stephen C. Adams, Bryan T. Carter, Cody H. Fleming, Peter A. Beling:
Selecting System Specific Cybersecurity Attack Patterns Using Topic Modeling. TrustCom/BigDataSE 2018: 490-497 - Usman Ahmad, Hong Song, Awais Bilal, Shahzad Saleem, Asad Ullah:
Securing Insulin Pump System Using Deep Learning and Gesture Recognition. TrustCom/BigDataSE 2018: 1716-1719 - Abu Shohel Ahmed, Tuomas Aura:
Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure. TrustCom/BigDataSE 2018: 104-111 - Hooman Alavizadeh, Julian Jang-Jaccard, Dong Seong Kim:
Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing. TrustCom/BigDataSE 2018: 573-578 - Yazeed Albabtain, Baijian Yang:
The Process of Reverse Engineering GPU Malware and Provide Protection to GPUS. TrustCom/BigDataSE 2018: 1669-1673 - Ashwag Albakri, Mahesh Maddumala, Lein Harn:
Hierarchical Polynomial-Based Key Management Scheme in Fog Computing. TrustCom/BigDataSE 2018: 1593-1597 - Concepcion Sanchez Aleman, Niki Pissinou, Sheila Alemany, Georges A. Kamhoua:
A Dynamic Trust Weight Allocation Technique for Data Reconstruction in Mobile Wireless Sensor Networks. TrustCom/BigDataSE 2018: 61-67 - Saqib Ali, Guojun Wang, Bebo White, Roger Leslie Cottrell:
A Blockchain-Based Decentralized Data Storage and Access Framework for PingER. TrustCom/BigDataSE 2018: 1303-1308 - Mimouna Alkhonaini, Hoda El-Sayed:
Migrating Data Between Physical Server and Cloud: Improving Accuracy and Data Integrity. TrustCom/BigDataSE 2018: 1570-1574 - Alaa Alsaig, Vangular Alagar, Olga Ormandjieva:
A Critical Analysis of the V-Model of Big Data. TrustCom/BigDataSE 2018: 1809-1813 - Filipe Apolinario, Miguel L. Pardal, Miguel Correia:
S-Audit: Efficient Data Integrity Verification for Cloud Storage. TrustCom/BigDataSE 2018: 465-474 - Muhammad Arif, Guojun Wang, Tao Peng:
Track me if you can? Query Based Dual Location Privacy in VANETs for V2V and V2I. TrustCom/BigDataSE 2018: 1091-1096 - Anshul Arora, Sateesh Kumar Peddoju:
NTPDroid: A Hybrid Android Malware Detector Using Network Traffic and System Permissions. TrustCom/BigDataSE 2018: 808-813 - Kevin Atighehchi:
On the Incremental Digital Signatures. TrustCom/BigDataSE 2018: 1605-1609 - Mohamed Azab, Ahmed Hamdy, Ahmed Mansour:
Repoxy: Replication Proxy for Trustworthy SDN Controller Operation. TrustCom/BigDataSE 2018: 55-60 - Tanushree Banerjee, M. Anwar Hasan:
Energy Efficiency Analysis of Elliptic Curve Based Cryptosystems. TrustCom/BigDataSE 2018: 1579-1583 - Judong Bao, Yongqiang He, Weiping Wen:
DroidPro: An AOTC-Based Bytecode-Hiding Scheme for Packing the Android Applications. TrustCom/BigDataSE 2018: 624-632 - Hamza Baqa, Nguyen Binh Truong, Noël Crespi, Gyu Myoung Lee, Franck Le Gall:
Quality of Information as an indicator of Trust in the Internet of Things. TrustCom/BigDataSE 2018: 204-211 - Anasse Bari, Goktug Saatcioglu:
Emotion Artificial Intelligence Derived from Ensemble Learning. TrustCom/BigDataSE 2018: 1763-1770 - Felix Beierle:
Do You Like What I Like? Similarity Estimation in Proximity-Based Mobile Social Networks. TrustCom/BigDataSE 2018: 1040-1047 - Rongzhen Bian, Mingfu Xue, Jian Wang:
Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique. TrustCom/BigDataSE 2018: 1458-1463 - Fabrizio Biondi, Thomas Given-Wilson, Axel Legay:
Universal Optimality of Apollonian Cell Encoders. TrustCom/BigDataSE 2018: 424-435 - Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu:
Superscalar Encrypted RISC: The Measure of a Secret Computer. TrustCom/BigDataSE 2018: 1336-1341 - Robert A. Bridges, Jarilyn Hernández Jiménez, Jeffrey Nichols, Katerina Goseva-Popstojanova, Stacy J. Prowell:
Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics. TrustCom/BigDataSE 2018: 1680-1684
skipping 258 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-29 11:50 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint